GANDaLF: GAN for Data-Limited Fingerprinting

نویسندگان

چکیده

Abstract We introduce Generative Adversarial Networks for Data-Limited Fingerprinting (GANDaLF), a new deep-learning-based technique to perform Website (WF) on Tor traffic. In contrast most earlier work deep-learning WF, GANDaLF is intended with few training samples, and achieves this goal through the use of Network generate large set “fake” data that helps train deep neural network in distinguishing between classes actual data. evaluate low-data scenarios including as 10 instances per site, multiple settings, fingerprinting website index pages non-index within site. closed-world accuracy 87% just 20 site (and 100 sites) standard WF settings. particular, can outperform Var-CNN Triplet (TF) across all settings subpage fingerprinting. For example, outperforms TF by 29% margin 38% sets using

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Manipulative Discourse of Gandalf

The aim of this essay is to investigate discursive, cognitive and social aspects of manipulation in regard to the dialogues of the literary fictional character of Gandalf in the trilogy of The Lord of the Rings. Accordingly, the researcher has taken a multidisciplinary approach to an account of discursive manipulation, and focuses on the cognitive dimensions of manipulation. As a result, the re...

متن کامل

Integrating Gandalf and HOL

Gandalf is a first-order resolution theorem-prover, optimized for speed and specializing in manipulations of large clauses. In this paper I describe GANDALF TAC, a HOL tactic that proves goals by calling Gandalf and mirroring the resulting proofs in HOL. This call can occur over a network, and a Gandalf server may be set up servicing multiple HOL clients. In addition, the translation of the Gan...

متن کامل

The Gandalf speaker verification database

The Gandalf speech database has been designed for use in research on automatic speaker verification. 86 customer speakers and 100 impostor speakers have been recorded in up to 24 telephone calls per speaker during a period of up to 12 months. In addition to speech files, Gandalf includes a relational database with a twofold function: it stores information on subjects and calls, and it is a tool...

متن کامل

Collusion-Secure Fingerprinting for Digital Data

This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data, e.g., software, documents, music, and video. Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy and trace it back to the user. This threat of detection will deter users from releasing unauthorized c...

متن کامل

Project selection with limited resources in data envelopment‎ ‎analysis‎

‎In this paper allocating a fixed resource for producing ‎finite projects in order to obtaining a desired level of‎ ‎efficiency will be discussed‎. ‎Note that it is assumed that a ‎vector of limited sources is at hand‎. ‎This vector of resources can‎ ‎be contained human resource‎, ‎budget‎, ‎equipment‎, ‎and facilities‎. ‎In ‎any firm there exist different suggestions from subunits for ‎running...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings on Privacy Enhancing Technologies

سال: 2021

ISSN: ['2299-0984']

DOI: https://doi.org/10.2478/popets-2021-0029